首页 > 最新文献

2014 International Conference on Advanced Computer Science and Information System最新文献

英文 中文
Fully unsupervised clustering in nonlinearly separable data using intelligent Kernel K-Means 基于智能核k均值的非线性可分数据的完全无监督聚类
Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065891
Teny Handhayani, Ito Wasito
Intelligent Kernel K-Means is a fully unsupervised clustering technique. This technique is developed by combining Intelligent K-Means and Kernel K-Means. Intelligent Kernel K-Means used to cluster kernel matrix without any information about the number of clusters. The goal of this research is to evaluate the performance of Intelligent Kernel K-Means for clustering nonlinearly separable data. Various artificial nonlinearly separable data are used in this experiment. The best result is the clustering often ring datasets. It produces Adjusted Rand Index (ARI) = 1.
智能核K-Means是一种完全无监督聚类技术。该技术将智能K-Means与核K-Means相结合。智能核K-Means用于对核矩阵进行聚类,不需要任何关于聚类数量的信息。本研究的目的是评估智能核k -均值对非线性可分数据聚类的性能。实验中使用了各种人为的非线性可分数据。最好的结果是聚类经常环数据集。它产生调整后的兰特指数(ARI) = 1。
{"title":"Fully unsupervised clustering in nonlinearly separable data using intelligent Kernel K-Means","authors":"Teny Handhayani, Ito Wasito","doi":"10.1109/ICACSIS.2014.7065891","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065891","url":null,"abstract":"Intelligent Kernel K-Means is a fully unsupervised clustering technique. This technique is developed by combining Intelligent K-Means and Kernel K-Means. Intelligent Kernel K-Means used to cluster kernel matrix without any information about the number of clusters. The goal of this research is to evaluate the performance of Intelligent Kernel K-Means for clustering nonlinearly separable data. Various artificial nonlinearly separable data are used in this experiment. The best result is the clustering often ring datasets. It produces Adjusted Rand Index (ARI) = 1.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129826774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integrated information system specification to support SSTC (South-South and Triangular Cooperation) program: A case study at national coordination team on SSTC Government of Indonesia 支持南南及三方合作项目的综合信息系统规范:印尼政府南南及三方合作国家协调小组的案例研究
Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065862
A. Fadhilah, Y. G. Sucahyo, Denny
In the international community. Indonesia is one of the country that quite active involved in international cooperation forums. One of the forums is South-South and Triangular Cooperation (SSTC), a new cooperation framework in political, economic, social, cultural and technical area between at least two developing countries and one developed country. In order to support SSTC, the Government of Indonesia formed the National Coordination Team on SSTC. In its implementation, the National Coordination Team (NCT) on SSTC has not shown satisfactory results due to the lack of coordination among the Ministry involved. As a result, the programs that exist today are mostly not linked to each other, not sustainable, and not providing the maximum impact for Indonesia. To make coordination in NCT easier, we proposed to create an integrated information system that supports all of cooperation process. This research tries to design an integrated information system software that can support SSTC program in Indonesia, using RUP (Rational Unified Process) method. The results of this research will be presented as a draft of system specification, and ready to use as an initial design of the software. With the implementation of integrated information system software, we expect that all cooperation programs conducted by Indonesia can linked to each other, sustainable, and bring maximum impact for the Indonesian progress.
在国际社会。印度尼西亚是相当积极参与国际合作论坛的国家之一。其中一个论坛是南南合作和三角合作(SSTC),这是一个至少两个发展中国家和一个发达国家在政治、经济、社会、文化和技术领域的新合作框架。为了支持南南合作,印度尼西亚政府成立了南南合作国家协调小组。在实施过程中,由于各有关部门之间缺乏协调,SSTC国家协调小组(NCT)没有显示出令人满意的结果。因此,目前存在的项目大多没有相互联系,不可持续,也没有为印度尼西亚提供最大的影响。为了使NCT的协调更加容易,我们建议建立一个支持所有合作进程的综合信息系统。本研究尝试使用RUP (Rational Unified Process)方法,设计一个能够支持印尼SSTC项目的集成信息系统软件。这项研究的结果将作为系统规范草案提出,并准备用作软件的初始设计。随着综合信息系统软件的实施,我们希望印尼开展的所有合作项目能够相互联系,可持续发展,为印尼的进步带来最大的影响。
{"title":"Integrated information system specification to support SSTC (South-South and Triangular Cooperation) program: A case study at national coordination team on SSTC Government of Indonesia","authors":"A. Fadhilah, Y. G. Sucahyo, Denny","doi":"10.1109/ICACSIS.2014.7065862","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065862","url":null,"abstract":"In the international community. Indonesia is one of the country that quite active involved in international cooperation forums. One of the forums is South-South and Triangular Cooperation (SSTC), a new cooperation framework in political, economic, social, cultural and technical area between at least two developing countries and one developed country. In order to support SSTC, the Government of Indonesia formed the National Coordination Team on SSTC. In its implementation, the National Coordination Team (NCT) on SSTC has not shown satisfactory results due to the lack of coordination among the Ministry involved. As a result, the programs that exist today are mostly not linked to each other, not sustainable, and not providing the maximum impact for Indonesia. To make coordination in NCT easier, we proposed to create an integrated information system that supports all of cooperation process. This research tries to design an integrated information system software that can support SSTC program in Indonesia, using RUP (Rational Unified Process) method. The results of this research will be presented as a draft of system specification, and ready to use as an initial design of the software. With the implementation of integrated information system software, we expect that all cooperation programs conducted by Indonesia can linked to each other, sustainable, and bring maximum impact for the Indonesian progress.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130768405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Element extraction and evaluation of packaging design using computational Kansei Engineering approach 基于感性工学的包装设计元素提取与评价
Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065861
Taufik Djatna, Fajar Munichputranto, N. Hairiyah, E. Febriani
Currently packaging design needs more a computational processing roles and became the fundamental selling art of products. Design of packaging is very subjective and company needs to understand customer's behavior, perception and attractiveness. Challenges arise when marketing in fast moving consumer goods is getting very dynamic and competitive. Computational needs to identify customer's perception and attractiveness is unavoidable. In this paper we proposed new methodology to extract and evaluate information elements of packaging design from customer preferences using computational Kansei Engineering (KE) approach. The elements of packaging design were extracted from group discussion and evaluate centrality and novelty metrics using Key Element Extraction (KEE) algorithm. Correlation of packaging design elements and Kansei words was obtained with association rule mining (ARM). This formulation enabled us to define which packaging design elements are strongly correlated with each Kansei/affective words and gives recommendation to designer what kind of packaging to design. In short this proposed methods become a quantification of the art of packaging design that ease a reliable design.
目前包装设计更需要一个计算处理的角色,成为产品销售的根本艺术。包装设计是非常主观的,公司需要了解顾客的行为、感知和吸引力。当快速消费品的市场营销变得非常动态和竞争激烈时,挑战就出现了。识别客户感知和吸引力的计算需求是不可避免的。在本文中,我们提出了新的方法,以提取和评估信息元素的包装设计从客户的偏好使用计算感性工学(KE)的方法。从小组讨论中提取包装设计元素,并使用关键元素提取(KEE)算法评估中心性和新颖性指标。利用关联规则挖掘技术(ARM)获得包装设计元素与感性词的相关性。这个公式使我们能够定义哪些包装设计元素与每个感性/情感词密切相关,并为设计师提供设计哪种包装的建议。简而言之,这种提出的方法成为一种量化包装设计的艺术,简化了可靠的设计。
{"title":"Element extraction and evaluation of packaging design using computational Kansei Engineering approach","authors":"Taufik Djatna, Fajar Munichputranto, N. Hairiyah, E. Febriani","doi":"10.1109/ICACSIS.2014.7065861","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065861","url":null,"abstract":"Currently packaging design needs more a computational processing roles and became the fundamental selling art of products. Design of packaging is very subjective and company needs to understand customer's behavior, perception and attractiveness. Challenges arise when marketing in fast moving consumer goods is getting very dynamic and competitive. Computational needs to identify customer's perception and attractiveness is unavoidable. In this paper we proposed new methodology to extract and evaluate information elements of packaging design from customer preferences using computational Kansei Engineering (KE) approach. The elements of packaging design were extracted from group discussion and evaluate centrality and novelty metrics using Key Element Extraction (KEE) algorithm. Correlation of packaging design elements and Kansei words was obtained with association rule mining (ARM). This formulation enabled us to define which packaging design elements are strongly correlated with each Kansei/affective words and gives recommendation to designer what kind of packaging to design. In short this proposed methods become a quantification of the art of packaging design that ease a reliable design.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126574560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of University of Indonesia next generation firewall prototype and access control with deep packet inspection 开发印尼大学下一代防火墙原型和访问控制与深度包检测
Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065869
Harish Muhammad Nazief, T. A. Sabastian, Alfan Presekal, G. Guarddin
Currently there are dozens of internet based applications. Each of these applications can be accessed by their user on the same application layer protocols but different pattern of payloads. For example social network applications like Facebook, Twitter and Google Plus. Each of them can be accessed using HTTPS protocol, but with different payload for each applications. It also possible to access a service in internet by using tunneled protocol, for example Bit Torrent protocol can be tunneled on top HTTP access. These kind of access modes make standard firewalls obsolete to regulate our university internet access control. In this research, we are aiming to prove whether an application layer access control can be developed using Deep Packet Inspection Method. With the deep packet inspection method, it is possible to identify applications based on their application signature. If the application signature can be identified, we can construct more robust rules to regulate university internet access control. We are developing a prototype of application layer access control using several number of free/open source software components. One of these components is Deep Packet Inspection Library - nDPI - which will become our main focus. This research also will explain the way to assemble those software components in order to perform access control functions. We are also performing a test against nDPI payload detection mechanism and the results are reported in this paper.
目前有几十个基于互联网的应用程序。这些应用程序中的每一个都可以由它们的用户通过相同的应用层协议访问,但使用不同的有效负载模式。例如像Facebook, Twitter和谷歌Plus这样的社交网络应用程序。它们中的每一个都可以使用HTTPS协议访问,但是每个应用程序具有不同的有效负载。也可以通过使用隧道协议访问互联网上的服务,例如Bit Torrent协议可以在HTTP访问上隧道化。这些访问方式使得标准防火墙无法规范高校网络访问控制。在本研究中,我们旨在证明是否可以使用深度包检测方法开发应用层访问控制。使用深度包检测方法,可以根据应用的特征来识别应用。如果应用签名可以被识别,我们就可以构建更健壮的规则来规范大学网络访问控制。我们正在使用一些免费/开源软件组件开发应用层访问控制的原型。其中一个组件是深度包检测库(nDPI),它将成为我们的主要关注点。本研究还将解释如何组装这些软件组件,以执行访问控制功能。我们还对nDPI有效载荷检测机制进行了测试,并在本文中报告了结果。
{"title":"Development of University of Indonesia next generation firewall prototype and access control with deep packet inspection","authors":"Harish Muhammad Nazief, T. A. Sabastian, Alfan Presekal, G. Guarddin","doi":"10.1109/ICACSIS.2014.7065869","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065869","url":null,"abstract":"Currently there are dozens of internet based applications. Each of these applications can be accessed by their user on the same application layer protocols but different pattern of payloads. For example social network applications like Facebook, Twitter and Google Plus. Each of them can be accessed using HTTPS protocol, but with different payload for each applications. It also possible to access a service in internet by using tunneled protocol, for example Bit Torrent protocol can be tunneled on top HTTP access. These kind of access modes make standard firewalls obsolete to regulate our university internet access control. In this research, we are aiming to prove whether an application layer access control can be developed using Deep Packet Inspection Method. With the deep packet inspection method, it is possible to identify applications based on their application signature. If the application signature can be identified, we can construct more robust rules to regulate university internet access control. We are developing a prototype of application layer access control using several number of free/open source software components. One of these components is Deep Packet Inspection Library - nDPI - which will become our main focus. This research also will explain the way to assemble those software components in order to perform access control functions. We are also performing a test against nDPI payload detection mechanism and the results are reported in this paper.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"78 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134231145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A system analysis and design for sorghum based nano-composite film production 高粱基纳米复合膜生产的系统分析与设计
Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065870
Belladini Lovely, Taufik Djatna
The existence of process complexity and higher inter-dependency within production system of biodegradable sorghum-based nanocomposite film are obviously required for system analysis and design. In this paper, nanocomposite film production was simulated in Business Process Modeling Notation (BPMN) model to assist researchers in decision making. The system was designed by using 2 processing variables as the model input, namely hydrolysis time and plasticizer ratio. Then by modifying and controlling value of these variables, researcher would determine their influences on 3 nanocomposite film crucial physical and thermal properties, such as Water Vapor Permeability (WVP), X-Ray Diffraction (XRD) and Derivative Thermo-gravimetric (DTG). Numerical examples were implemented in order to illustrate the related issues. Model verification result showed that the model succeeded conducting an improvement for all film properties compared to other various composites. Therefore this system is potentially possible to simulate sorghum-based nanocomposite film production in a simpler and fully controllable model.
生物降解高粱基纳米复合膜生产系统存在着工艺复杂性和较高的相互依赖性,这显然是系统分析和设计所必需的。本文采用业务流程建模符号(BPMN)模型对纳米复合薄膜的生产过程进行了模拟,以帮助研究人员进行决策。系统设计采用水解时间和增塑剂比2个工艺变量作为模型输入。然后,通过修改和控制这些变量的值,研究人员将确定它们对3种纳米复合薄膜关键物理和热性能的影响,如水蒸气渗透率(WVP)、x射线衍射(XRD)和导数热重(DTG)。通过数值算例对相关问题进行了说明。模型验证结果表明,与其他复合材料相比,该模型成功地改善了膜的各项性能。因此,该系统有可能在一个更简单和完全可控的模型中模拟高粱基纳米复合膜的生产。
{"title":"A system analysis and design for sorghum based nano-composite film production","authors":"Belladini Lovely, Taufik Djatna","doi":"10.1109/ICACSIS.2014.7065870","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065870","url":null,"abstract":"The existence of process complexity and higher inter-dependency within production system of biodegradable sorghum-based nanocomposite film are obviously required for system analysis and design. In this paper, nanocomposite film production was simulated in Business Process Modeling Notation (BPMN) model to assist researchers in decision making. The system was designed by using 2 processing variables as the model input, namely hydrolysis time and plasticizer ratio. Then by modifying and controlling value of these variables, researcher would determine their influences on 3 nanocomposite film crucial physical and thermal properties, such as Water Vapor Permeability (WVP), X-Ray Diffraction (XRD) and Derivative Thermo-gravimetric (DTG). Numerical examples were implemented in order to illustrate the related issues. Model verification result showed that the model succeeded conducting an improvement for all film properties compared to other various composites. Therefore this system is potentially possible to simulate sorghum-based nanocomposite film production in a simpler and fully controllable model.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"37 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122829488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Citation sentence identification and classification for related work summarization 引用句识别和分类,进行相关工作总结
Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065871
D. H. Widyantoro, Imaduddin Amin
Scientific article summarization is an important problem because it can be of helpful for researchers, particularly for those who start a new research topic. In this paper, we address the problem of related work summarization from scientific papers. The process of summarization comprises of extracting citation sentence followed by classifying the rhetorical category of citation sentence. Citation sentence extraction is performed by combining regular expression-based patterns, co-reference system, evidence-based approach and additional extraction rule. Citation sentence is represented as feature vectors containing term frequency, sentence length, thematic word and cue phrase feature groups. The learning of classification model is explored using Naïve Bayes, Complement Naïve Bayes and Decision Tree. Experiment results reveal that the approaches adopted for citation sentence extraction and rhetorical category classification is promising to provide the ground work for related work summarization.
科学文章摘要是一个重要的问题,因为它可以帮助研究人员,特别是那些开始一个新的研究课题。在本文中,我们解决了科学论文的相关工作摘要问题。摘要的过程包括提取引文句子,然后对引文句子的修辞范畴进行分类。引用句提取采用基于规则表达式的模式、共同参考系统、循证方法和附加提取规则相结合的方法。引用句被表示为包含词频、句子长度、主题词和提示短语特征组的特征向量。使用Naïve贝叶斯,补充Naïve贝叶斯和决策树来探索分类模型的学习。实验结果表明,所采用的引文句子提取和修辞范畴分类方法有望为相关工作总结提供基础工作。
{"title":"Citation sentence identification and classification for related work summarization","authors":"D. H. Widyantoro, Imaduddin Amin","doi":"10.1109/ICACSIS.2014.7065871","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065871","url":null,"abstract":"Scientific article summarization is an important problem because it can be of helpful for researchers, particularly for those who start a new research topic. In this paper, we address the problem of related work summarization from scientific papers. The process of summarization comprises of extracting citation sentence followed by classifying the rhetorical category of citation sentence. Citation sentence extraction is performed by combining regular expression-based patterns, co-reference system, evidence-based approach and additional extraction rule. Citation sentence is represented as feature vectors containing term frequency, sentence length, thematic word and cue phrase feature groups. The learning of classification model is explored using Naïve Bayes, Complement Naïve Bayes and Decision Tree. Experiment results reveal that the approaches adopted for citation sentence extraction and rhetorical category classification is promising to provide the ground work for related work summarization.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131113500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Tourism recommendation based on vector space model using composite social media extraction 基于向量空间模型的复合社交媒体提取旅游推荐
Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065894
H. Khotimah, Taufik Djatna, Yani Nurhadryani
Intentionally or not, social media users likely to share others recommendation about things, included tourism activities. In this paper we proposed a technique which was able to structure the joint recommendation of composite social media and extract them into knowledge about the tourist sites by deploying the vector space model. We included advice seeking technique to not only calculate recommendations obtained from the profile itself but also recommendations by social network users. This is a potential solution to handle sparsity problem that usually appears in conventional recommender systems. We further formulated an approach to normalize the unstructured text data of social media to obtain appropriate recommendation. We experimented the real world data from various source of social media in R language. We evaluated our result with Spearman's rank correlation and showed that our formulation has diversity recommendation with positive correlation to user's profile.
无论有意还是无意,社交媒体用户都可能分享他人对事物的推荐,包括旅游活动。本文提出了一种利用向量空间模型构建复合社交媒体联合推荐并将其提取为旅游景点知识的技术。我们加入了建议寻求技术,不仅计算从个人资料本身获得的推荐,还计算社交网络用户的推荐。这是处理传统推荐系统中经常出现的稀疏性问题的潜在解决方案。我们进一步制定了一种对社交媒体的非结构化文本数据进行规范化的方法,以获得合适的推荐。我们用R语言对来自各种社交媒体来源的真实世界数据进行了实验。我们用Spearman的秩相关来评估我们的结果,表明我们的配方具有与用户个人资料正相关的多样性推荐。
{"title":"Tourism recommendation based on vector space model using composite social media extraction","authors":"H. Khotimah, Taufik Djatna, Yani Nurhadryani","doi":"10.1109/ICACSIS.2014.7065894","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065894","url":null,"abstract":"Intentionally or not, social media users likely to share others recommendation about things, included tourism activities. In this paper we proposed a technique which was able to structure the joint recommendation of composite social media and extract them into knowledge about the tourist sites by deploying the vector space model. We included advice seeking technique to not only calculate recommendations obtained from the profile itself but also recommendations by social network users. This is a potential solution to handle sparsity problem that usually appears in conventional recommender systems. We further formulated an approach to normalize the unstructured text data of social media to obtain appropriate recommendation. We experimented the real world data from various source of social media in R language. We evaluated our result with Spearman's rank correlation and showed that our formulation has diversity recommendation with positive correlation to user's profile.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Model prediction for accreditation of public junior high school in Bogor using spatial decision tree 基于空间决策树的茂物公立初中认证模型预测
Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065831
Endang Purnama Giri, A. M. Arymurthy
Indonesia has a large geographic area with large variance of quality service of education. This paper will analyze whether it has a correlation or not, between the quality level of school and its characteristic of geographic area. This paper describes performance of two kind of decision tree method in predicting level of accreditation for public junior high school in Bogor, West Java. With three scenarios (training set as testing set, leave one out, and 3-fold cross validation) using conventional decision tree (ID3) the accuracy level reach 97.14%, 40%, and 51.51% respectively. On the other hand, using spatial decision tree (SDT) the accuracy reach level 97.14%, 54.29%, and 54.28%. Based on the accuracy level and the structure of tree that was constructed, SDT produce better result. These facts will imply that quality level of public junior high schools on Bogor have correlation with characteristics of geographic area. However, SDT need much more computation time to construct decision tree rather than ID3, so for big number of data and big number of attributes, SDT will not appropriate.
印尼幅员辽阔,教育服务质量参差不齐。本文将分析学校质量水平与其地理区域特征之间是否存在相关性。本文介绍了两种决策树方法在预测西爪哇茂物市公立初中认证水平中的应用效果。采用传统决策树(ID3),在训练集作为测试集,留一个,三重交叉验证三种场景下,准确率分别达到97.14%,40%,51.51%。空间决策树(SDT)的准确率分别达到97.14%、54.29%和54.28%。基于精度水平和所构建的树的结构,SDT取得了较好的效果。这些事实表明,茂物公立初中的质量水平与地理区域特征存在相关性。但是,SDT在构建决策树时需要比ID3更多的计算时间,因此对于数据量大、属性量大的情况,SDT将不适合。
{"title":"Model prediction for accreditation of public junior high school in Bogor using spatial decision tree","authors":"Endang Purnama Giri, A. M. Arymurthy","doi":"10.1109/ICACSIS.2014.7065831","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065831","url":null,"abstract":"Indonesia has a large geographic area with large variance of quality service of education. This paper will analyze whether it has a correlation or not, between the quality level of school and its characteristic of geographic area. This paper describes performance of two kind of decision tree method in predicting level of accreditation for public junior high school in Bogor, West Java. With three scenarios (training set as testing set, leave one out, and 3-fold cross validation) using conventional decision tree (ID3) the accuracy level reach 97.14%, 40%, and 51.51% respectively. On the other hand, using spatial decision tree (SDT) the accuracy reach level 97.14%, 54.29%, and 54.28%. Based on the accuracy level and the structure of tree that was constructed, SDT produce better result. These facts will imply that quality level of public junior high schools on Bogor have correlation with characteristics of geographic area. However, SDT need much more computation time to construct decision tree rather than ID3, so for big number of data and big number of attributes, SDT will not appropriate.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114884732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy C-means for Deforestation Identification Based on Remote Sensing Image 基于遥感影像的森林砍伐模糊c均值识别
Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065848
Setiawan Afandi, Y. Herdiyeni, L. Prasetyo
This research report about Fuzzy C-Means for Deforestation Identification Based On Remote Sensing Image. Deforestation means that changes forest area into another functions. Clustering is a method of classify objects into related groups (clusters). While, Fuzzy C-Means clustering is a technique that each data is determined by the degree of membership. In this research, the data used are MODIS EVI 250 m in 2000 and 2012 to identify deforestation rate in Java island. MODIS EVI is one of kind MODIS image which is able to detect vegetation based on photosynthesis rate and vegetation density. The number of clusters used were 13 clusters. This research had succeeded to classify areas based on the value of EVI like areas who had a high EVI values (forests, plantations, grass land), moderate values (agricultural area), and low values (build up area, mining area, pond, and other land cover). But, EVI value is only influenced by photosynthesis rate and vegetation density. Thus, EVI value is not well to identify forest areas, this is because the value of EVI in forest areas are almost same with plantations, savanna, etc.
本文研究了基于遥感影像的森林砍伐模糊c均值识别方法。森林砍伐意味着将森林变为另一种功能。聚类是一种将对象划分为相关组(聚类)的方法。而模糊c均值聚类是一种由隶属度决定每个数据的聚类技术。本研究使用2000年和2012年MODIS EVI 250 m数据来确定爪哇岛的森林砍伐率。MODIS EVI是一种基于光合速率和植被密度对植被进行检测的MODIS图像。使用的集群数量为13个集群。本研究成功地将EVI值划分为高EVI值区域(森林、人工林、草地)、中等EVI值区域(农业区)和低EVI值区域(建成区、矿区、池塘等土地覆盖)。而EVI值仅受光合速率和植被密度的影响。因此,EVI值并不能很好地识别森林区域,这是因为森林区域的EVI值与人工林、稀树草原等几乎相同。
{"title":"Fuzzy C-means for Deforestation Identification Based on Remote Sensing Image","authors":"Setiawan Afandi, Y. Herdiyeni, L. Prasetyo","doi":"10.1109/ICACSIS.2014.7065848","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065848","url":null,"abstract":"This research report about Fuzzy C-Means for Deforestation Identification Based On Remote Sensing Image. Deforestation means that changes forest area into another functions. Clustering is a method of classify objects into related groups (clusters). While, Fuzzy C-Means clustering is a technique that each data is determined by the degree of membership. In this research, the data used are MODIS EVI 250 m in 2000 and 2012 to identify deforestation rate in Java island. MODIS EVI is one of kind MODIS image which is able to detect vegetation based on photosynthesis rate and vegetation density. The number of clusters used were 13 clusters. This research had succeeded to classify areas based on the value of EVI like areas who had a high EVI values (forests, plantations, grass land), moderate values (agricultural area), and low values (build up area, mining area, pond, and other land cover). But, EVI value is only influenced by photosynthesis rate and vegetation density. Thus, EVI value is not well to identify forest areas, this is because the value of EVI in forest areas are almost same with plantations, savanna, etc.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133571273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Extending V-model practices to support SRE to build secure web application 扩展v模型实践以支持SRE构建安全的web应用程序
Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065838
Ala A. Abdulrazeg, N. Norwawi, N. Basir
Technological advancements and rapid growth in the use of the Internet by the society have had a huge impact on information security. It has triggered the need for a major shift in the way web applications are developed. The high level security of these applications is crucial to their success. Therefore, information security has become a core requirement for producing trustworthy software driven by the need to guard critical assets. To develop a web application with adequate security features, it is highly recommended to capture security requirements early in the development lifecycle. In this paper, we propose a way of extending the V-Model requirements engineering phase to aid developers to engineer security requirements for a web application being developed, as well as, handling the security test planning. The aim is to support the proactive definition of security requirements by integrating security requirements engineering (SRE) activities with requirements engineering (RE) activities of the V-model.
技术的进步和社会对互联网使用的快速增长对信息安全产生了巨大的影响。它引发了对web应用程序开发方式的重大转变的需求。这些应用程序的高级安全性对它们的成功至关重要。因此,在保护关键资产的需求的驱动下,信息安全已成为生产值得信赖的软件的核心需求。要开发具有足够安全特性的web应用程序,强烈建议在开发生命周期的早期捕获安全需求。在本文中,我们提出了一种扩展V-Model需求工程阶段的方法,以帮助开发人员为正在开发的web应用程序设计安全性需求,以及处理安全性测试计划。其目的是通过集成v模型的安全需求工程(SRE)活动和需求工程(RE)活动来支持安全需求的主动定义。
{"title":"Extending V-model practices to support SRE to build secure web application","authors":"Ala A. Abdulrazeg, N. Norwawi, N. Basir","doi":"10.1109/ICACSIS.2014.7065838","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065838","url":null,"abstract":"Technological advancements and rapid growth in the use of the Internet by the society have had a huge impact on information security. It has triggered the need for a major shift in the way web applications are developed. The high level security of these applications is crucial to their success. Therefore, information security has become a core requirement for producing trustworthy software driven by the need to guard critical assets. To develop a web application with adequate security features, it is highly recommended to capture security requirements early in the development lifecycle. In this paper, we propose a way of extending the V-Model requirements engineering phase to aid developers to engineer security requirements for a web application being developed, as well as, handling the security test planning. The aim is to support the proactive definition of security requirements by integrating security requirements engineering (SRE) activities with requirements engineering (RE) activities of the V-model.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116542013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2014 International Conference on Advanced Computer Science and Information System
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1